The Samsung Epic 4G is the latest Android 4G phone released on Sprint, it is a variant of the Samsung Galaxy S which now can be found on pretty much all the major US carriers. joeykrim @ SDX-Developers released a root procedure that gives you permanent root privileges on the Samsung Epic 4G.

Rooting your device can be risky and it may void your warranty. You’re following this process at your own risk, we will not be responsible for any damage caused to your device.

Description: This is a temporary patch to guarantee permanent root. Once custom kernels are released with root incorporated, this patch won't be required anymore. For now, this patch will execute on every boot ensuring the root environment is correctly setup

3 - Commands for temporary root Exploit: adb shell chmod 755 /data/local/tmp/rageagainstthecage-arm5.bin cd /data/local/tmp ./rageagainstthecage-arm5.bin exit exit will exit out of the adb shell, and then type adb shell again. this time it should drop you to # instead of $. if it goes back to $, run the exploit again, cd /data/local/tmp ./rageagainstthecage-arm5.bin and exit out of adb and then adb shell again to see if its # . if it doesn’t work the first time, repeat 4-5 times. it will work!

The Samsung Epic 4G is the latest Android 4G phone released on Sprint, it is a variant of the Samsung Galaxy S which now can be found on pretty much all the major US carriers. joeykrim @ SDX-Developers released a root procedure that gives you permanent root privileges on the Samsung Epic 4G.

Rooting your device can be risky and it may void your warranty. You’re following this process at your own risk, we will not be responsible for any damage caused to your device.

Description: This is a temporary patch to guarantee permanent root. Once custom kernels are released with root incorporated, this patch won't be required anymore. For now, this patch will execute on every boot ensuring the root environment is correctly setup

3 - Commands for temporary root Exploit: adb shell chmod 755 /data/local/tmp/rageagainstthecage-arm5.bin cd /data/local/tmp ./rageagainstthecage-arm5.bin exit exit will exit out of the adb shell, and then type adb shell again. this time it should drop you to # instead of $. if it goes back to $, run the exploit again, cd /data/local/tmp ./rageagainstthecage-arm5.bin and exit out of adb and then adb shell again to see if its # . if it doesn’t work the first time, repeat 4-5 times. it will work!